Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
N10-006 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Braindumps CompTIA N10-006 Dumps with VCE and PDF 141-150

September 18, 2017

EnsurePass
2017 Sep CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/N10-006.html

CompTIA Network Certification

Question No: 141 – (Topic 5)

Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?

  1. Firewall

  2. Router

C. 802.11 AP

D. Switch

Answer: C Explanation:

802.11 AP is a Wireless Access Point used in a wireless network.

If two computers on a network send data frames at thesame time, a collision between the frames can occur. The frames are then discarded and the sending computers will attempt to send the data again.

Carrier sense multiple access with collision avoidance (CSMA/CA) is a protocol used in wireless networks wherecomputers connected to the wireless network attempt to avoid collisions by transmitting data only when the channel is sensed to be quot;idlequot;. Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is unreliable in wireless networks because computers connected to the wireless network often cannot see each other so CSMA/CA is a better option for avoiding collisions.

Request to Send/Clear to Send (RTS/CTS) can also be used to mediate access to the wireless network. This goes some way to alleviating the problemof computers not being able to see each other because in a wireless network, the Wireless Access Point only issues a “Clear to Send” to one node at a time.

With RTS/CTS, a Request to Send (RTS) packet is sent by the sending computer, and a Clear to Send(CTS) packet is sent by the intended receiver. This will alert all computers within range of the sender, receiver or both, to not transmit for the duration of the transmission. This is known as the IEEE 802.11 RTS/CTS exchange.

Question No: 142 – (Topic 5)

In an engineering office, all plotters are configured via static IP. Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO).

  1. Rack monitoring

  2. Device placement

  3. Wall plate labeling

  4. Room numbering

  5. Patch panel labeling

Answer: C,E Explanation:

By labeling each wall plate (where the plotters’ network cables plug in to) and the patch panel ports (where the cables connecting to each wall plate terminate), we’ll be able to see which device is connected to which port. If equipment moves are required, we will be able to easily see which patch cables need to be moved in the patch panel.

Question No: 143 – (Topic 5)

A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram?

  1. Building layout

  2. Patch panel labeling

  3. Packet sniffing

  4. Naming conventions

Answer: D Explanation:

The building in this question has several floors and the floors are large enough to be identified by area such as ‘west side’ etc. It is likely that a logical diagram of the network in such a building would be quite complicated and the network is likely to have several switches.

A naming convention is a standard for naming items, in this case, networking components. When it comes to naming switches, using names like Switch1, Switch2 etc. for example won’t help when you need to know where the switches are located.

In a building with multiple floors with each floor large enough to be defined by area names, you could a naming convention like SW1-FL4-WS where SW1 identifies the item as a Switch with the number 1, FL4 identifiesthe location as Floor 4 and WS further identifies the location as West Side. Using this convention, switch number 2 on the third floor east side would be named SW2-FL3-ES.

Question No: 144 – (Topic 5)

Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following?

  1. SOP

  2. BEP

  3. AUP

  4. SLA

Answer: C Explanation:

AUP stands for Acceptable Use Policy. An Acceptable Use Policy defines what a user can or cannot do with his or her computer during business hours. For example, using the company’s Internet connection to look at the sports scores on a sports website may be deemed inappropriate or unacceptable during business hours. Other examples include the use of social media websites such as Facebook or using Instant Messaging clients to chat to your friends.

Question No: 145 – (Topic 5)

A network technician has just installed a TFTP server on the administrative segment of the network to store router and switch configurations. After a transfer attempt to the server is made, the process errors out. Which of the following is a cause of the error?

  1. Only FTP can be used to copy configurations from switches

  2. Anonymous users were not used to log into the TFTP server

  3. An incorrect password was used and the account is now locked

  4. Port 69 is blocked on a router between thenetwork segments

Answer: D Explanation:

The question states that the TFTP server is installed on the “administrative segment of the network”. This implies that the network has multiple segments (subnets) and TFTP server is on a different network segment to other computers.

For a computer on one subnet to connect to a computer on a different subnet, a router is required to route traffic between the two subnets. Routers often include firewalls so they

can be configured to allow specific traffic to be routed between the subnets and block unwanted traffic.

TFTP uses UDP port 69. The most likely cause of the connection timeout error in the question is that the firewall has not been configured to allow traffic using UDP port 69.

Question No: 146 – (Topic 5)

The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. Which of following standards should be used?

A. 802.11a B. 802.11b C. 802.11g D. 802.1x

Answer: A Explanation:

In this question, we need a wireless network that operates at a frequency higher than the 2.4GHz frequency.

802.11 is a set of IEEE standards that govern wireless networking transmission methods. The 802.11 standards commonly used today to provide wireless connectivity in home or office wireless networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.

The 802.11a standard supports speeds up to 54Mbps and uses the 5-GHzband.

Question No: 147 – (Topic 5)

A network engineer is dispatched to an employee office to troubleshoot an issue with the employee#39;s laptop. The employee is unable to connect to local and remote resources. The network engineer flips the laptop#39;s wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue resolved?

  1. Layer 1

  2. Layer 2

  3. Layer 3

  4. Layer 4

  5. Layer 7

Answer: A Explanation:

The bottom layer of the OSI reference model is Layer 1, the physical layer. Thephysical layer is the layer that defines the hardware elements of a network. These elements include:

Network Interface Cards Network topology Network cabling

The type of signals used for data transmittions

In this question, the network engineer flippedthe laptop#39;s wireless switch on to resolve the issue. The laptop was unable to connect to the wireless network because the wireless network interface card was switched off. Switching the wireless network interface card on

enabled the laptop to connect to the wireless network. The wireless network interface card is a physical layer device.

Question No: 148 – (Topic 5)

A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following default ports needs to be opened?

A. 445

B. 3389

C. 5004

D. 5060

Answer: B Explanation:

RDP (Remote Desktop Protocol) is used for connecting to a remote Windows computer. When using RDP to connect to a remote Windows computer, you can view and control the desktop of the remote computer. RDP uses TCP port 3389.

Question No: 149 – (Topic 5)

When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO).

  1. Layer 2

  2. Layer 3

  3. Layer 5

  4. Transport layer

  5. Data link

  6. Physical layer

Answer: A,E Explanation:

Layer 2 of the OSI reference model is the data-link layer. Components of the data-linklayer include frame-format, Media Access Control (MAC) addressing, protocol identification and error detection.

When data is being sent, it is split into protocol data units (PDUs) as it passes through the layers of the OSI model. The PDUs have different names as they are passed through the layers of the OSI model. In layer 2, the PDU is called a ‘Frame’.

The most common protocol specified in the data-link layer is Ethernet and the most common network component in the data-link layer is a network switch.

Inthis question, problems are discovered with Ethernet frames by examining the logs in a network switch. Therefore, for this question, we are working in Layer 2, the data-link layer.

Question No: 150 – (Topic 5)

Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?

  1. CSMA/CD

  2. OSPF

  3. DOCSIS

  4. BGP

Answer: A Explanation:

Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is used by devices in an Ethernet network for transmittingdata on the network.

Any device on an Ethernet network can send data at any time. The network devices sense when the line is idle and therefore available for the transmission of data. The network device then transmits a data frame onto the network. If another device sends a frame at exactly the same time, a collision occurs and the frames are discarded. The network devices will then wait for a random period of time before attempting to send the frame again.

100% Free Download!
Download Free Demo:N10-006 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass N10-006 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE